
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@backt/protocol
Advanced tools
Backt smart contracts implementation
> npm i -g truffle@4.1.11
> npm i
NOTE: specific truffle version specified above as newer versions break the build - needs investigating.
npm test
The deployment command will recompile contracts, update the ABI and run the tests and then deploy contracts to the blockchain.
// kovan
> npm run deploy-kovan
NOTE: the very first time the contracts are deployed to a new network the deployer should run 'npm run deploy-<network>-first-time' instead of 'npm run deploy-<network>' as this will install the permanent Registry contract that all future deployments share. It contains a mapping of all CFDs ever created as well as the address of the most recent CFDFactory contract.
// ensure repo has latest abi
> npm run publish-abi
> git add abi && git commit -m "updated ABI" abi
// ensure tests are passing
> truffle develop
truffle> test
// publish NPM
npm version patch # bumps the version number and tags the commit
npm publish # see package.json scripts prepare - this will run the tests before publishing
git push --tags
The package is published with the contract ABI JSON files (abi/) and js libraries (lib/) to @backt/protocol.
FAQs
Backt smart contracts implementation
The npm package @backt/protocol receives a total of 2 weekly downloads. As such, @backt/protocol popularity was classified as not popular.
We found that @backt/protocol demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.